Sciweavers

317 search results - page 29 / 64
» Who gives a tweet
Sort
View
CDC
2008
IEEE
153views Control Systems» more  CDC 2008»
14 years 3 months ago
A stackelberg game for pricing uplink power in wide-band cognitive radio networks
— We study the problem of pricing uplink power in wide-band cognitive radio networks under the objective of revenue maximization for the service provider and while ensuring incen...
Ashraf Al Daoud, Tansu Alpcan, Sachin Kumar Agarwa...
ICPR
2008
IEEE
14 years 3 months ago
Re-ranking of web image search results using a graph algorithm
We propose a method to improve the results of image search engines on the Internet to satisfy users who desire to see relevant images in the first few pages. The method re-ranks ...
Hilal Zitouni, Sare Gul Sevil, Derya Ozkan, Pinar ...
P2P
2008
IEEE
14 years 3 months ago
Incentives Against Hidden Action in QoS Overlays
Peer-to-peer networks providing QoS-enabled services are sensitive to hidden action situations, where the actions of a server peer are hidden from the peers who receive services f...
Raul Landa, Miguel Rio, David Griffin, Richard G. ...
ICPADS
2007
IEEE
14 years 3 months ago
Extending GridSim with an architecture for failure detection
Grid technologies are emerging as the next generation of distributed computing, allowing the aggregation of resources that are geographically distributed across different location...
Agustín C. Caminero, Anthony Sulistio, Blan...
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
14 years 3 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters